Open in app

Sign In

Write

Sign In

A. Boukar
A. Boukar

95 Followers

Home

About

Published in InfoSec Write-ups

·Apr 18, 2022

Create Bind and Reverse Shells using Netcat

Netcat (nc, ncat, or the swiss army knife of networking, as some might prefer to call it) is a command-line utility that every self-respecting pentester should carry under their belt. Attackers often use Netcat to create reverse shells on a target machine. …

Netcat

7 min read

Create Bind and Reverse Shells using Netcat
Create Bind and Reverse Shells using Netcat
Netcat

7 min read


Published in InfoSec Write-ups

·Apr 8, 2022

Server-Side Request Forgery (SSRF) Explained

Server-Side Request Forgery (or SSRF) is an attack that consists of inducing a web application to send back-end requests to an unintended destination. Driven by the increasing popularity of Cloud services and complex back-end architectures, this attack has become more and more common in recent years. In the OWASP Top…

Ssrf

4 min read

Server-Side Request Forgery (SSRF) Explained
Server-Side Request Forgery (SSRF) Explained
Ssrf

4 min read


Published in InfoSec Write-ups

·Feb 5, 2022

Host Header Injection Attacks

Host Header injection is not the type of attack that you would normally find in CTFs or security challenges. However, it is widespread in the wild web. It is also not exceedingly difficult to exploit once you encounter a vulnerable web server, as this article will later show. Before we…

Http Host Header

4 min read

Host Header Injection Attacks
Host Header Injection Attacks
Http Host Header

4 min read


Dec 31, 2021

HTTP Request Smuggling Explained

HTTP Request Smuggling ( HRS) is a type of attack that is gaining more and more attention in recent years. Its rise is fueled by the high prevalence of Cloud-based applications and services. In this article, we’ll learn the basics of this attack. We’ll see how it works, how to…

Http Request Smuggling

5 min read

HTTP Request Smuggling Explained
HTTP Request Smuggling Explained
Http Request Smuggling

5 min read


Published in InfoSec Write-ups

·Dec 12, 2021

XXE Attacks Explained

Out of the many attacks that threaten web applications today, XXE remains the one that is talked about the least. Although it gets far less attention than XSS or SQL injections, it does carry its own risk and should not be taken as a slight. In this guide, I will…

Xxe

7 min read

XXE Attacks Explained
XXE Attacks Explained
Xxe

7 min read


Nov 28, 2021

CSRF (Cross-Site Request Forgery) Explained

Cross- Site Request Forgery (CSRF or XSRF), also called Client-Side Request Forgery, is a type of attack that targets web applications. It allows an attacker to induce users into accessing and changing a state on a website inadvertently. In this article, we are going to explain how CSRF attacks work…

Csrf

4 min read

CSRF (Cross-Site Request Forgery) Explained
CSRF (Cross-Site Request Forgery) Explained
Csrf

4 min read


Published in CodeX

·Sep 26, 2021

A Quick Guide To Regular Expressions

Regular expressions are present in almost all programming languages (Python, PHP, Javascript…), as well as in Linux commands (grep, sed…) and in many other high-level languages and applications. So, why are they so widely present? what exactly are they used for? and how can we start using them ourselves? Before…

Regular Expressions

9 min read

A Quick Guide To Regular Expressions
A Quick Guide To Regular Expressions
Regular Expressions

9 min read


Published in Geek Culture

·Aug 13, 2021

Introduction to Cross-Site Scripting (XSS)

This article presents a great introduction for anyone trying to learn about Cross-Site Scripting (or XSS). You don’t need to be an expert to follow along. However, you do need to know some basics about how the web works in order to gain the most from this article. We will…

Cross Site Scripting

5 min read

Introduction to Cross-Site Scripting (XSS)
Introduction to Cross-Site Scripting (XSS)
Cross Site Scripting

5 min read


Published in CodeX

·Aug 6, 2021

Using THC Hydra To Brute Force Login Forms

THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against different types of applications and services. When a web application relies on usernames and passwords as its only line of defense, a pentester or a malicious user can use Hydra…

Hydra

6 min read

Using THC Hydra To Brute Force Login Forms
Using THC Hydra To Brute Force Login Forms
Hydra

6 min read


Published in CodeX

·Jul 30, 2021

Linux Privilege Escalation — Three Easy Ways to Get a Root Shell

Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account with limited privileges to a superuser account with full privileges. There are many options that can help you achieve this, ranging from simple and easy…

Linux

5 min read

Linux Privilege Escalation — Three Easy Ways to Get a Root Shell
Linux Privilege Escalation — Three Easy Ways to Get a Root Shell
Linux

5 min read

A. Boukar

A. Boukar

95 Followers

A cybersecurity enthusiast, and founder @ Patchthenet.com

Following
  • Vickie Li

    Vickie Li

  • Luke Stephens (@hakluke)

    Luke Stephens (@hakluke)

See all (5)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech